barebones-computer-guide.com

 

Virus Protection Often Lets Destructive Trojans Gallop on by

During the Trojan War, the city of Troy and its walls was thought to be impenetrable. As history goes, their downfall was allowing a wooden horse offered as a gift, into the city walls. Unbeknownst to the Trojans, the “gift” was filled with their enemies armed and ready to attack. So, what appeared to be a gift was actually an attack. The same is true with destructive Internet Trojans: they appear to be computer programs with a certain function, but in actuality they are disguising more sinister plans (such as accessing your computer files from a remote location.) When it comes to worm and virus detection antivirus software works great, but there is spyware and Trojans that sneak by since they are technically not really viruses. This is a problem because if there is internet vulnerability, Trojan creators seem to find them-and fast. In December 2004 hackers needed only one week to create a Trojan to targeted vulnerabilities in internet explorer security.

For example, the Trojan called LowZone will actually lower your internet explorer security settings! So, what can you do to keep Trojans out if virus protection doesn’t always do the trick? First, it is vital that you have virus software since they catch many of these programs. You will also want to download a free version of anti-spyware software. This will block Trojans or detect and delete them from your computer. Since they also block spy-and-adware these programs are excellent for deterring what could lead to other computer problems. SpyBot Search & Destroy is free and one of the most popular such programs. With SpyBot it is important to choose the Immunize button first to make sure you are checking for all possible malicious programs known. For added PC protection perform a free online Trojan scanner which you can find online.

Also, if you use Microsoft Windows visit for updates on internet explorer security, Trojan warnings and security patches visit the Microsoft web site. Red Hat/Linux users can find the latest information about their security vulnerabilities at the Red Hat security updates Web page.



Links

Software for Trojans and Virus Protection

Pc cillin Antivirus


>